Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["SRX Series"], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [{"changes": [{"at": "12.1X46-D71, 12.1X46-D73", "status": "unaffected"}], "lessThan": "12.1X46*", "status": "affected", "version": "12.1X46-D25", "versionType": "custom"}, {"lessThan": "12.3X48-D50", "status": "affected", "version": "12.3X48", "versionType": "custom"}, {"lessThan": "15.1X49-D75", "status": "affected", "version": "15.1X49", "versionType": "custom"}]}], "configurations": [{"lang": "en", "value": "An example configuration snippet is below: \n root@device# show security nat proxy-arp \n interface ge-0/0/0.0 { \n address { \n 2.2.2.5/32; \n } \n }"}], "datePublic": "2019-04-10T00:00:00", "descriptions": [{"lang": "en", "value": "A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series."}], "exploits": [{"lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}], "metrics": [{"cvssV3_0": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2019-04-12T15:06:05", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://kb.juniper.net/JSA10922"}, {"name": "107882", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/107882"}], "solutions": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.1X46-D71, 12.1X46-D73, 12.3X48-D50, 15.1X49-D75, 17.3R1, and all subsequent releases."}], "source": {"advisory": "JSA10922", "defect": ["1208910"], "discovery": "USER"}, "title": "SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured.", "workarounds": [{"lang": "en", "value": "Discontinue use of proxy ARP.\nAn example configuration snippet is below:\n deactivate security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32\n(or)\n delete security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 \n \nThere are no other viable workarounds for this issue."}], "x_generator": {"engine": "Vulnogram 0.0.6"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-04-10T16:00:00.000Z", "ID": "CVE-2019-0033", "STATE": "PUBLIC", "TITLE": "SRX Series: A remote attacker may cause a high CPU Denial of Service to the device when proxy ARP is configured."}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Junos OS", "version": {"version_data": [{"platform": "SRX Series", "version_affected": ">=", "version_name": "12.1X46", "version_value": "12.1X46-D25"}, {"platform": "SRX Series", "version_affected": "<", "version_name": "12.1X46", "version_value": "12.1X46-D71, 12.1X46-D73"}, {"platform": "SRX Series", "version_affected": "<", "version_name": "12.3X48", "version_value": "12.3X48-D50"}, {"platform": "SRX Series", "version_affected": "<", "version_name": "15.1X49", "version_value": "15.1X49-D75"}]}}]}, "vendor_name": "Juniper Networks"}]}}, "configuration": [{"lang": "en", "value": "An example configuration snippet is below: \n root@device# show security nat proxy-arp \n interface ge-0/0/0.0 { \n address { \n 2.2.2.5/32; \n } \n }"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A firewall bypass vulnerability in the proxy ARP service of Juniper Networks Junos OS allows an attacker to cause a high CPU condition leading to a Denial of Service (DoS). This issue affects only IPv4. Affected releases are Juniper Networks Junos OS: 12.1X46 versions above and including 12.1X46-D25 prior to 12.1X46-D71, 12.1X46-D73 on SRX Series; 12.3X48 versions prior to 12.3X48-D50 on SRX Series; 15.1X49 versions prior to 15.1X49-D75 on SRX Series."}]}, "exploit": [{"lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability."}], "generator": {"engine": "Vulnogram 0.0.6"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-400 Uncontrolled Resource Consumption"}]}]}, "references": {"reference_data": [{"name": "https://kb.juniper.net/JSA10922", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10922"}, {"name": "107882", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107882"}]}, "solution": [{"lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.1X46-D71, 12.1X46-D73, 12.3X48-D50, 15.1X49-D75, 17.3R1, and all subsequent releases."}], "source": {"advisory": "JSA10922", "defect": ["1208910"], "discovery": "USER"}, "work_around": [{"lang": "en", "value": "Discontinue use of proxy ARP.\nAn example configuration snippet is below:\n deactivate security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32\n(or)\n delete security nat proxy-arp interface ge-0/0/0.0 address 2.2.2.5/32 \n \nThere are no other viable workarounds for this issue."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T17:37:07.407Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kb.juniper.net/JSA10922"}, {"name": "107882", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/107882"}]}]}, "cveMetadata": {"assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0033", "datePublished": "2019-04-10T20:13:51.204757Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T01:11:20.764Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}